King Phisher: Phishing Toolkit for Red Teams

King Phisher, created by SecureState, is a tool designed to simulate real-life scenario phishing attacks that may occur on a corporate network. It’s intended for red teaming, enabling the user to create complex attack scenarios to test internally if anyone in the organization fails to identify the bait.

This highly flexible tool allows you to run numerous phishing campaigns simultaneously, control the phishing email's content (embedded images, HTML, and more), map the location of all the phishing victims, and run SPF checks (Sender Policy Framework) for forging sender address during email delivery.

Post Meta

Post Excerpt

How can professional investigators securely conduct research on social media without exposing their organization? Authentic8’s Nick Finnberg, OSINT training specialist and former intelligence analyst, shared insights and tradecraft insights, tips and tools at a webinar on social media investigations.

*

There are more than 3.5 billion active social media users across the world. Facebook, Instagram, Twitter, LinkedIn, Reddit, 8chan and Co. can be a treasure trove for law enforcement, fraud investigators, corporate security specialists, and Open Source Intelligence (OSINT) analysts. Provided, that is, the researchers have tools at their disposal that are up to the task.

That’s a big IF. Online investigators need to be able to quickly and efficiently collect, save, and collaboratively analyze data while maintaining adequate operational security (OpSec). This often poses a challenge, because they also grapple with budget constraints, inadequate online tools with inherent security vulnerabilities, and an acute shortage of properly trained cybersecurity personnel.

Post Meta

Post Excerpt

Security Officers, are your online researchers still relying on custom-made covert investigation solutions cobbled together from disparate tools to save money? New research proves that the opposite is happening: It costs you extra.

A few years ago, providing research teams with out-of-the-box capabilities to perform anonymous online research was crazy expensive. The task of enabling cyber threat hunting, without the risk of crippling the network, for example, needed a separate six-figure line item on the IT budget. It’s no wonder that there are so many organizations that rely on a patchwork of make-do and DIY tools and methods.

Today though, the DIY approach to enabling sensitive research on the open, deep, or dark web is unnecessary, as well as out of sync with the demands of our rapidly changing internet threatscape.

A new comparative analysis by Authentic8 shows how DIY costs leaps and bounds more money than the new, low maintenance, SaaS alternative available today.